Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing - STOC '88 1988
DOI: 10.1145/62212.62241
|View full text |Cite
|
Sign up to set email alerts
|

A deterministic algorithm for sparse multivariate polynomial interpolation

Abstract: tiolynomi:lI time algorilhni is tlc~clopctl for the spnrsc polynomi;tl inlcrpohtion problem. The numhcr of cv;~lu:~lions nccdcd by this algorithm is very small. The algorithm also has a simple NC implcmcntation.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
220
0
2

Year Published

1995
1995
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 250 publications
(224 citation statements)
references
References 9 publications
2
220
0
2
Order By: Relevance
“…In complexity theory, identity testing played a major role in results such as IP = PSPACE [LFKN92,Sha92], MIP = NEXPTIME [BFL91], and the proof of the PCP theorem [AS98, ALM + 98]. Identity testing algorithms also lead to interpolation/learning algorithms for sparse polynomials, see [BT88,GKS90,KS01] and references within, for depth-3 circuits [Shp09,KS08], and for read-once arithmetic formulas [SV08, SV09].…”
Section: Polynomial Identity Testingmentioning
confidence: 99%
“…In complexity theory, identity testing played a major role in results such as IP = PSPACE [LFKN92,Sha92], MIP = NEXPTIME [BFL91], and the proof of the PCP theorem [AS98, ALM + 98]. Identity testing algorithms also lead to interpolation/learning algorithms for sparse polynomials, see [BT88,GKS90,KS01] and references within, for depth-3 circuits [Shp09,KS08], and for read-once arithmetic formulas [SV08, SV09].…”
Section: Polynomial Identity Testingmentioning
confidence: 99%
“…Ben-Or/Tiwari [8] Zippel [49] KS [ Remark that Algorithm 6 given by Theorem 6 has a better total complexity and delay than KS algorithm when the degree is less or equal to 10. Open question: is it possible to turn Algorithm 6 into a fixed parameter algorithm?…”
Section: Resultsmentioning
confidence: 99%
“…with all possible monomials, can be done efficiently through inversion of a Vandermonde matrix. This method is always exponential in the number of variables, but better algorithms (both deterministic and probabilistic) have been designed for a polynomial represented either by a black box or a circuit [8,49,25,19]. Their complexity polynomially depends on the number of mono-mials of the polynomial which can be much smaller than the potential number of monomials.…”
Section: Motivations and Connection To Previous Workmentioning
confidence: 99%
“…This is an application of the Ben-Or/Tiwari algorithm [1] in the power basis of yj = xj + sj. Applying the early termination Ben-Or/Tiwari algorithm [12] to the power basis of yj = xj + sj, then when pj are distinct random values, without σ supplied as an input, the target polynomial can be interpolated in the given s-shifted basis with high probability.…”
Section: Sparse Interpolation On Shifted Bases With Early Terminationmentioning
confidence: 99%
“…Our algorithms are based on the early termination version [12] of the Ben-Or/ Tiwari sparse interpolation algorithm [1]. The main idea is that for a symbolic set of interpolation points, a shift must be a root of a discrepancy in the Berlekamp/Massey algorithm [18], which is called by the Ben-Or/Tiwari method.…”
Section: Introductionmentioning
confidence: 99%